Malicious Software The Contractor or subcontractors that discover and isolate malicious software in connection with a reported cyber incident shall submit the malicious software in accordance with instructions provided by the Contracting Officer.
Determination of Responsiveness 28.1 The Procuring Entity's determination of a Tender's responsiveness is to be based on the contents of the Tender itself, as defined in ITT28.2.
Whistle Blowing Protection The Employer agrees to adhere to the whistle blowing protection pursuant to the
Freedom of Information Act Provider acknowledges that this Agreement and all documents submitted to the Board related to this contract are a matter of public record and are subject to the Illinois Freedom of Information Act (5 ILCS 140/1) and any other comparable state and federal laws and that this Agreement is subject to reporting requirements under 105 ILCS 5/10-20.44. Provider further acknowledges that this Agreement shall be posted on the Board’s website at xxx.xxx.xxx.